{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:53:56Z","timestamp":1725972836188},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811088896"},{"type":"electronic","value":"9789811088902"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8890-2_12","type":"book-chapter","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T11:54:25Z","timestamp":1522151665000},"page":"163-179","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Placement Fraud Detection on Smart Phones: A Joint Crowdsourcing and Data Analyzing Based Approach"],"prefix":"10.1007","author":[{"given":"Bo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"key":"12_CR1","unstructured":"IAB Internet Advertising Revenue Report, 2012 Full Year Results. \nhttps:\/\/www.iab.com\/wp-content\/uploads\/2015\/05"},{"key":"12_CR2","unstructured":"IAB Internet Advertising Revenue Report, 2016 Full Year Results. \nhttps:\/\/www.iab.com\/wp-content\/uploads\/2016\/04"},{"key":"12_CR3","unstructured":"The Truth About Mobile Click Fraud. \nhttp:\/\/www.imgrind.com\/the-truth-aboutmobile-click-fraud"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Metwally, A., Agrawal, D., El Abbadi, A.: Duplicate detection in click streams. In: 14th International Conference on World Wide Web, pp. 12\u201321. ACM (2005)","DOI":"10.1145\/1060745.1060753"},{"key":"12_CR5","unstructured":"Metwally, A., Agrawal, D., Abbadi, A.E.: Using association rules for fraud detection in web advertising networks. In: 31st International Conference on Very Large Data Bases, pp. 169\u2013180. VLDB Endowment (2005)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S.: SAWM: a tool for secure and authenticated web metering. In: 14th International Conference on Software Engineering and Knowledge Engineering, pp. 641\u2013648. ACM (2002)","DOI":"10.1145\/568760.568871"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/11600930_5","volume-title":"Internet and Network Economics","author":"N Immorlica","year":"2005","unstructured":"Immorlica, N., Jain, K., Mahdian, M., Talwar, K.: Click fraud resistant methods for learning click-through rates. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 34\u201345. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11600930_5"},{"key":"12_CR8","unstructured":"The Lan\u2019s Gifts v. Google Report. \nhttp:\/\/googleblog.blogspot.com\/pdf\/Tuzhilin_Report.pdf"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kantardzic, M., Walgampaya, C., Wenerstrom, B., Lozitskiy, O., Higgins, S., King, D.: Improving click fraud detection by real time data fusion. In: IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2008, pp. 69\u201374 (2008)","DOI":"10.1109\/ISSPIT.2008.4775655"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Costa, R.A., de Queiroz, R.J., Cavalcanti, E.R.: A proposal to prevent click-fraud using clickable CAPTCHAs. In: 2012 IEEE Sixth International Conference Software Security and Reliability Companion (SERE-C), pp. 62\u201367. IEEE (2012)","DOI":"10.1109\/SERE-C.2012.13"},{"key":"12_CR11","unstructured":"Bots Mobilize. \nhttp:\/\/www.dmnews.com\/bots-mobilize\/article\/291566\/"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Blizard, T., Livic, N.: Click-fraud monetizing malware: a survey and case study. In: 2012 7th International Conference Malicious and Unwanted Software (MALWARE), pp. 67\u201372. IEEE (2012)","DOI":"10.1109\/MALWARE.2012.6461010"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-22424-9_10","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"B Miller","year":"2011","unstructured":"Miller, B., Pearce, P., Grier, C., Kreibich, C., Paxson, V.: What\u2019s clicking what? Techniques and innovations of today\u2019s clickbots. In: Holz, T., Bos, H. (eds.) DIMVA 2011. LNCS, vol. 6739, pp. 164\u2013183. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22424-9_10"},{"key":"12_CR14","unstructured":"Liu, B., Nath, S., Govindan, R., Liu, J.: DECAF: detecting and characterizing ad fraud in mobile apps. In: NSDI, pp. 57\u201370 (2014)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Crussell, J., Stevens, R., Chen, H.: Madfraud: investigating ad fraud in android applications. In: 12th Annual International Conference on Mobile Systems, Applications, and Services, pp. 123\u2013134. ACM (2014)","DOI":"10.1145\/2594368.2594391"},{"issue":"4","key":"12_CR16","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/2377677.2377715","volume":"42","author":"V Dave","year":"2012","unstructured":"Dave, V., Guha, S., Zhang, Y.: Measuring and fingerprinting click-spam in ad networks. ACM SIGCOMM Comput. Commun. Rev. 42(4), 175\u2013186 (2012)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"12_CR17","unstructured":"AdMob Publisher Guidelines and Policies. \nhttp:\/\/support.google.com\/admob\/answer\/1307237?hl=en&topic=1307235"},{"key":"12_CR18","unstructured":"Microsoft pubCenter Publisher Terms and Conditions. \nhttp:\/\/pubcenter.microsoft.com\/StaticHTML\/TC\/TCen.html"}],"container-title":["Communications in Computer and Information Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8890-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T12:02:37Z","timestamp":1522152157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8890-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811088896","9789811088902"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8890-2_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}